Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 19:18
Behavioral task
behavioral1
Sample
c70e86cf184a8f7486b48897da54f4652fdd2d8f71ee9084ed7a4c6620be10e9.exe
Resource
win7-20241010-en
7 signatures
150 seconds
General
-
Target
c70e86cf184a8f7486b48897da54f4652fdd2d8f71ee9084ed7a4c6620be10e9.exe
-
Size
74KB
-
MD5
fd5acfc89a8f9d7c1ed6fea61f0ddf23
-
SHA1
68829b58f10717f467ff98c4f10475d099d6b0f9
-
SHA256
c70e86cf184a8f7486b48897da54f4652fdd2d8f71ee9084ed7a4c6620be10e9
-
SHA512
5af3ebc444bfc5ac09b45eca94fcc114036cd550b48fd08dda0abf09cc2e1fc8b192d897a96fe939618edb4c64da2c316c0f89530b2e5246c45910824281400c
-
SSDEEP
1536:8UUPcxVteCW7PMVee9VdQuDI6H1bf/neQLJqQzcBLVclN:8UmcxV4x7PMVee9VdQsH1bfPfLJqQYBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
147.185.221.25:45714
Mutex
pxgdsrtuon
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral1/memory/2208-1-0x0000000000E00000-0x0000000000E18000-memory.dmp VenomRAT -
Venomrat family
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2208 c70e86cf184a8f7486b48897da54f4652fdd2d8f71ee9084ed7a4c6620be10e9.exe 2208 c70e86cf184a8f7486b48897da54f4652fdd2d8f71ee9084ed7a4c6620be10e9.exe 2208 c70e86cf184a8f7486b48897da54f4652fdd2d8f71ee9084ed7a4c6620be10e9.exe 2208 c70e86cf184a8f7486b48897da54f4652fdd2d8f71ee9084ed7a4c6620be10e9.exe 2208 c70e86cf184a8f7486b48897da54f4652fdd2d8f71ee9084ed7a4c6620be10e9.exe 2208 c70e86cf184a8f7486b48897da54f4652fdd2d8f71ee9084ed7a4c6620be10e9.exe 2208 c70e86cf184a8f7486b48897da54f4652fdd2d8f71ee9084ed7a4c6620be10e9.exe 2208 c70e86cf184a8f7486b48897da54f4652fdd2d8f71ee9084ed7a4c6620be10e9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2208 c70e86cf184a8f7486b48897da54f4652fdd2d8f71ee9084ed7a4c6620be10e9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2208 c70e86cf184a8f7486b48897da54f4652fdd2d8f71ee9084ed7a4c6620be10e9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c70e86cf184a8f7486b48897da54f4652fdd2d8f71ee9084ed7a4c6620be10e9.exe"C:\Users\Admin\AppData\Local\Temp\c70e86cf184a8f7486b48897da54f4652fdd2d8f71ee9084ed7a4c6620be10e9.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2208